MagicNET: XACML Authorization Policies for Mobile Agents Mr. Awais Shibli
Presentation Overview 1. Mobile Agents 2. NIST 3. Background 4. Research Problem 5. Solution 6. Conclusion
Mobile Agents Mobile agents are self-contained software modules with additional credentials and accumulated data. They roam a network, moving autonomously from one server to another, perform their designated tasks, and finally, eventually, return to their control station.
Security Threats- NIST-1998 Agent-to-Platform –Masquerading, Denial of Service, Unauthorized Access Agent-to-Agent –Masquerade, Denial of Service, Repudiation, Unauthorized Access Platform-to-Agent –Masquerade, Denial of Service, Eavesdropping, Alteration Other-to-Agent Platform –Masquerade, Unauthorized Access, Denial of Service, Copy and Replay
Background.. Authorization of Mobile agents Delegation of Access rights
Traditional Solution Users Authorization –RBAC –ACL –Attribute based Access Control
Research Problem.. Comprehensive solution for Mobile agents authorization ?? –Infrastructure Components –Delegation of rights from user to agent.
Solution ?? Infrastructure Components Binding between users and agents
MagicNET System Components MagicNET stands for Mobile Agents Intelligent Community Network, has developed at secLab at DSV Department at KTH. MagicNET provide complete infrastructural and functional component for secure mobile agent research and development. It provide support to build secure & trusted mobile agents, provide agents repository (agents’ store), Mobile Agents Servers (for their runtime execution), Mobile Agent Control Station, Infrastructural servers.
Authorization System RBAC XAML for Agents
Infrastructure Components
Execution.....
Policies Structure...
Entities namespace... Entity nameEntity value (URI)Std. Xacmlurn:oasis:names:tc:xacml:1.0:XACML xmlhttp:// rule-combineurn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:XACML policy-combineurn:oasis:names:tc:xacml:1.0:policy-combining-algorithm:XACML functionurn:oasis:names:tc:xacml:1.0:function:XACML subject-categorysubject-category “urn:oasis:names:tc:xacml:1.0:subject-category:XACML subjecturn:oasis:names:tc:xacml:1.0:subject:XACML resourceurn:oasis:names:tc:xacml:1.0:resource:XACML actionurn:oasis:names:tc:xacml:1.0:action:XACML environmenturn:oasis:names:tc:xacml:1.0:environment:XACML roleurn:oasis:names:tc:xacml:2.0:subject:roleRBAC UserRoleurn:magicnet:names:AgentAuthPolicy:1.0:UserRole-values:- AgentRoleurn:magicnet:names:AgentAuthPolicy:1.0:AgentRole-values:- CategoryAttributeurn:magicnet:names:AgentAuthPolicy:1.0:attribute:SubjectCategory- AgentAuthPolicyurn:magicnet:names:AgentAuthPolicy:1.0:PolicyId:- AgentAdoptionPoliciesurn:magicnet:names:AgentAuthPolicy:1.0:AgentAdoptionPolicies- AgentAccessCPoliciesurn:magicnet:names:AgentAuthPolicy:1.0:AgentAccessControlPolicies- NS abbreviationNamespace definitionStd. xacmlhttp://
Conclusion and Future work Authorization infrastructure and structure of RBAC XACML policies for agents Federation ??? Agent baggage access control
Questions ???